Virtual Identity Server - Customer Use Cases

In this session Optimal IdM will highlight customer use cases. They will detail out how one customer deployed FIM, VIS + VIS Federation, UAG, and AD FS as a part of a large scale identity management solution, and another case will focus on a large insurance company with over 100 forests and 400,000 users.

In this session we'll present the Microsoft Reference Architecture to help Utility companies become NERC CIP compliant. This solution is a complete package; instead of piecing together components from many different sources, Oxford Computer Group in conjunction with Microsoft have created a comprehensive solution, which helps you lower the cost of integration and acquisition. We'll show you how the Microsoft and partner product ecosystem come together to reach access control compliance as we map CIP requirements to ISO 27001 and 27002 and NIST.

Join Oxford Computer Group and Microsoft for a webinar on April 17th. Nasos Kladakis, Senior Product Marketing Manager for Windows Azure, will present the capabilities and features of Windows Azure Active Directory, including:

•Simplified Synchronization with on-premises directories,
•Simplified group-based, single sign-on to hundreds of SaaS applications,
•Machine learning-based security and usage reports,
•Alerting and Multi-Factor authentication for effectively protecting enterprise data and resources on any cloud.
•Self-service password reset and delegated group management,
•Customizable environment for launching enterprise and consumer applications to reduce help-desk support calls
•and empower end-users to access their cloud applications from everywhere, with a single set of credentials.

Who has access to what information in your organization? Is the access they have to your systems appropriate? If asked, could you run an accurate report on it?

Organizations managing Active Directory (AD) face the everyday challenge of contending with users, groups, and computer objects that constantly change. Often AD will have as many security models as there are domains and forests, each of which dictates the management of these objects in different ways resulting in confusion, unnecessary expense, and security risk.

Today, most organizations attempt to overcome these problems with multiple tools or manual scripts, none of which quite seem to get the job done. The challenge of finding a baseline on your current state, taking corrective action, and performing ongoing housekeeping is impossible without a proper auditing and reporting solution.

In this webinar, you can learn more how an AD Health Check from Oxford Computer Group can help you find the flaws in your Active Directory and what you can do to remedy them. We will show you how StealthAUDIT®, a Management Platform (SMP) for Active Directory from STEALTHbits, provides deep visibility into the health and security of AD.

In an increasingly mobile and device-driven world, multi-factor authentication (MFA) can help to safeguard access to your data and applications while simultaneously keeping the sign-in process simple for your users.

Join us for a webinar about MFA. We'll discuss how it reduces organizational risk and helps enable regulatory compliance by providing an extra layer of authentication. Strong authentication via mobile applications, phone calls and text messages, allows users to choose the method that works best for them.

We'll consider how Windows Azure Multi-Factor Authentication can be used for both on-premises and cloud applications.

Microsoft Forefront Identity Manager (FIM) 2010 R2 is a flexible and highly configurable platform for creating automated identity and access management solutions. It can connect to a huge variety of directories, databases and other systems - and then provision and synchronize users, groups and passwords according to policies that reflect business and security imperatives. FIM also provides capabilities for role management, and governance of access and permission data.

In this demo-laden webinar we use one of our proof of concept set-ups to walk you through the typical use cases that crop up day by day - from on-boarding a new employee, through self-service password reset, implementing a new permissions policy, producing management reports for audit, to a permissions attestation cycle.

After a brief introduction to WAAD and the business challenges it meets so well, Robert will go on to explain more of the technical detail of WAAD and typical implementation scenarios. We have lots of questions from the previous webinar which we'll provide in-depth answers to. And there will be time for an extended Q&A session with Robert. That's not an opportunity you get every day!

So if you are embracing the Cloud, or planning your move to the Cloud, join this extended 60 minute webinar and learn what WAAD will do for you.

Businesses must protect their assets, especially as security boundaries are changing. Leverage your existing identity foundation as a way to enforce access policies across current and new applications. Oxford Computer Group is pleased to host the third webinar, Identity and Access Governance for Hybrid Identity, as part of a three-part series leading up to our Summit on the Microsoft Redmond campus January 7 – 9, 2014.

Hundreds of education institutions have upgraded their students to Office 365 while leaving faculty on-premise.

Take full advantage of the benefits of Office 365 by moving your existing on-premise Microsoft exchange to an Exchange Hybrid. This will give you increased functionality, such as free/busy calendar sharing; securely synchronized mail across both mail environments; and a single domain name.

Not only do your users want to access SaaS applications such as Microsoft Office 365 or popular applications from Salesforce.com, Concur, and Service now, they expect to leverage existing AD authentication to IT systems from wherever they are, and you have to keep your organization's data secure. Right?

In a world of consumerized devices with an ever increasing availability of affordable high-speed cellular and Wi-Fi networks, people are increasingly mobile and expect to have access to both personal and work information from anywhere, and on any device. Our customers need solutions that enable them to deploy and configure access to corporate resources across their on-premises environment and cloud applications while helping to protect their corporate information.

In this session, we will review how Microsoft is approaching this challenge and delivering solutions in Windows Server 2012 R2.

On-premise, off-premise, private cloud, public cloud, bring your own device. The world of IT is rapidly changing and bringing with it many new and exciting opportunities.

The modern IT landscape is typically a hybrid environment and constantly evolving. So what does it take to embrace modern IT and exploit its many benefits? What are the challenges, how do you get there and how do you stay there? In this webinar we examine those very questions.

Taking our own organization as an example, Oxford Computer Group CEO, Hugh Simpson-Wells, will take you through a whistle-stop tour of the main business drivers for hybrid IT, the challenges it presents and how you can overcome them. They'll be discussion on "the collapse of the perimeter", the impact on the service desk and why governance becomes even more important than ever before. You'll also hear about the Microsoft technologies that can be employed, including Windows Azure Active Directory, FIM 2010 and System Center 2012.

This session is ideal for CTO's, CISO's and senior IT staff who need to provide efficient, agile and secure IT platforms for complex IT environments. Although we will talk about technology the main focus will be on the business drivers and challenges and how to overcome them.

In this 60 minute webinar, STEALTHbits and Oxford Computer Group will present the StealthAUDIT Management Platform for Active Directory and how it works with FIM 2010 R2.

Identity Management solutions have traditionally done a good job of incorporating systems with entitlement stores into their workflow processes, but in the world of Unstrucutured Data there are no entitlement stores. We'll discuss how StealthAUDIT incorporates unstructured data into FIM 2010 R2, and how they work together to provide provisioning and self-help workflows that grant access to Unstructured Data.

Join Oxford Computer Group for a discussion on planning for a Microsoft Forefront Identity Manager 2010 R2 upgrade or installation. This is a great webinar for architects, consultants, system engineers, and system administrators to get some insight into deploying FIM 2010 R2. During this discussion you will learn from the experts:
-FIM 2010 R2 components and benefits
-Key upgrade scenarios (such as dirsync, ILM, etc)
-Key considerations and gotcha's

During this 60 minute webinar we will go over how the BHOLD Suite and the Analytics module can create rules and manage the authorization process. We'll discuss how rule-based testing of access data can be used if organizational policies are being followed, as well as the automated "what if" impact analysis.

In this 45 minute webinar, we will present the specifics of the Model Generator Module in FIM 2010 R2, and how it creates a basic role model based on existing user access rights. We will also discuss how the Model Generator proposes role definitions based on statistics and user attributes (e.g. job titles).

Knowing who really has access to what systems is vital for regulatory compliance and for safeguarding security. In many cases manual processes are leaving fundamental vulnerabilities unnoticed and making audit and reporting difficult. This webinar will explore the subject of Access Governance and showcase BHOLD Suites. Knowing who really has access to what systems is vital for regulatory compliance and for safeguarding security. In many cases manual processes are leaving fundamental vulnerabilities unnoticed and making audit and reporting difficult. Join us to discover how RBAC can help automate the process.
Solutions for Access Governance and Automation will:
i.Reduce account administration costs
ii.Provide an insight in to your current status regarding accounts and authorizations
iii.Expose compliance and security policy violations
iv.Help you prove compliance to laws, rules and regulations (e.g. SOX, FSA, PCI DSS etc.)
v.Give you confidence in the quality of your data

In this webinar we will discuss the password reset capabilities in FIM 2010 R2 and its benefits. These benefits include a reduction in helpdesk costs, improved compliance outcomes, and an increase in user satisfaction. FIM 2010 R2 adds a broader reach for self-service password reset that goes beyond the desktop, more flexibility to meet organizational security requirements. In addition, there is also more flexibility for customization of the end user experience and added historical change reporting. We will conclude with a question and answer session.

Frank Drewes, Architect for Oxford Computer Group and Adam Steenwyk, Microsoft Program Manager

Oxford Computer Group will present an architectural overview of the reporting data structure and out-of-box reports, as well as a "how-to" for custom reporting. We will cover:
-Key Reporting features of FIM 2010 R2
-The component level architecture and data flow model behind the Reporting feature
-What you can do with the Reporting feature out of the box
-Customizing the Reporting feature

Expertise in Identity and Access Management from Oxford Computer Group

Oxford Computer Group has designed a series of webcasts aimed at educating IT and Identity Professionals on the most relevant topics. Every 3rd Thursday of the month, one of our experienced consultants or key partners will provide an informative lecture with plenty of time to answer your questions.